CVE-2020-5880
Published Apr 30, 2020
Last updated 5 years ago
Overview
- Description
- Om BIG-IP 15.0.0-15.0.1.3 and 14.1.0-14.1.2.3, the restjavad process may expose a way for attackers to upload arbitrary files on the BIG-IP system, bypassing the authorization system. Resulting error messages may also reveal internal paths of the server.
- Source
- f5sirt@f5.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.1
- Impact score
- 4.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-434
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07FC84CA-3E12-43FB-ADBD-7B988DEF3A97", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A2FA3A9-89F3-4F39-B076-7FEF784D0329", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BEE162F-A016-4EDB-A7D1-1F87945EED3E", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0CC481C-0956-4949-9C8C-450149C25C31", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F553CD8-01FF-4616-A32C-4F4B5844A6FD", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5A62B79-8E47-48B0-B0CA-12307846B327", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "547D6BFB-5DE8-4027-88EF-0349400494D1", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "931730C6-DAC7-46AA-8EC6-72BD3BD9B6F9", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7881BC1C-1B10-43D4-AD4A-545D7C7C4160", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51AD832B-5FAB-49CE-AF22-746BDD62E933", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17DCA2C1-FD7A-430F-AD7C-4AB2DF7E233E", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A7AE865-9E4F-4133-BB02-184F093FE750", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6DFBD76-20DB-497D-B407-1EAA5555B49F", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECCA9286-C22B-4685-A0E0-A8A678920A16", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64B21CD4-4D50-45EC-8297-D54A1BBC6521", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1D606A9-5C88-4F67-91BE-CA553BF1ED7C", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA369F2E-2E17-4BEA-B894-14656D977B93", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "549D7EB5-C514-44CA-8760-7A464369048B", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E0B6F31-DC75-49C9-9E59-EF1CD68B1B3D", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA41B182-C466-48E8-A45D-22E0444557F9", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D806FBF-8E6D-412C-B547-92AD9294B639", "versionEndIncluding": "14.1.2.3", "versionStartIncluding": "14.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19079FFF-32A8-4109-BFA8-787532451731", "versionEndIncluding": "15.0.1.3", "versionStartIncluding": "15.0.0" } ], "operator": "OR" } ] } ]